Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications.
“A hacker, who authorities believe to be the same one from the initial breach, took control of the computer and changed the acceptable level of sodium hydroxide — better known as lye, the main ingredient in many household drain cleaners — from 100 parts per million to 11100 parts per million. A water plant operator noticed immediately and corrected the change, Gualtieri said, adding that if the operator had missed it and the change didn’t trigger some of the plant’s alarms, the lye could have seeped into the water supply in 24 to 36 hours.”
A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said.
Human-Autonomy Interaction, Collaboration and Trust — Dr. Julie Marble, JHU Applied Physics Laboratory (APL)
Dr. Julie Marble is a senior scientist at the Johns Hopkins University Applied Physics Laboratory (JHUAPL) leading research in human-autonomy interaction, collaboration and trust.
After three months of reviewing more than 13000 hours of hacking exploits conducted by more than 580 cybersecurity researchers, DARPA today announced that its Finding Exploits to Thwart Tampering (FETT) Bug Bounty successfully proved the value of the secure hardware architectures developed under its System Security Integration Through Hardware and Firmware (SSITH) program while pinpointing critical areas to further harden defenses.
Kindly see my latest FORBES article: Thanks for reading and sharing and stay safe!
#cybersecurity #internetofthings
By 2025, it is expected that there will be more than 30 billion IoT connections, almost 4 IoT devices per person on average and that also amounts to trillions of sensors connecting and interacting on these devices.
In December 2018, researchers at Google detected a group of hackers with their sights set on Microsoft’s Internet Explorer. Even though new development was shut down two years earlier, it’s such a common browser that if you can find a way to hack it, you’ve got a potential open door to billions of computers.
Attacks on vulnerable computer networks and cyber-infrastructure—often called zero-day attacks—can quickly overwhelm traditional defenses, resulting in billions of dollars of damage and requiring weeks of manual patching work to shore up the systems after the intrusion.